In recent years, the rapid development in the field of wireless technologies led to the appearance of a new topic, known as the Internet of things (IoT). The IoT applications can be found in various fields of our life, such as smart home, health care, smart building, and etc. In all these applications, the data collected from the real world are transmitted through the Internet; therefore, these data have become a target of many attacks and hackers. Hence, a secure communication must be provided to protect the transmitted data from unauthorized access. This paper focuses on designing a secure IoT system to protect the sensing data. In this system, the security is provided by the use of Lightweight AES encryption algorithm to encrypt the data received from physical environment. The hardware used in this proposal is the Raspberry Pi 3 model B and two types of sensors. The LAES algorithm was embedded inside the Raspberry in order to protect the sensing data, that come from sensors connected to the Raspberry Pi, before sending them through the network. The analysis results show that the proposed IoT security system consumes less time in encryption/decryption and has high throughput when compared with others from related work. Its throughput is higher in about 19.24% than the value reported for one system in the related studies.
In his post colonial novel, In the Skin of a lion, the Canadian/Sri Lankan writer,
Michael Ondaatje is so interested in the term "Post colonialism" because he wants to show
that the term doesn't only refer to a period of time that comes after colonialism. In other
words, post colonialism is not only referred to as a literal description of formerly colonial
societies. He deals with the termas a literary genre and an academic construct that describes
the global conditions of a man after a period of colonialism. He shows that post colonialism is
a theory that tries to examine and explore the different styles and faces of European authority
to control the colonized. Ondaatje's attempt through such term is to unmask Europ
Mass transfer correlations for iron rotating cylinder electrode in chloride/sulphate solution, under isothermal and
controlled heat transfer conditions, were derived. Limiting current density values for the oxygen reduction reaction from
potentiostatic experiments at different bulk temperatures and various turbulent flow rates, under isothermal and heat
transfer conditions, were used for such derivation. The corelations were analogous to that obtained by Eisenberg et all
and other workers.
Incorporating the LiDAR sensor in the most recent Apple devices represents a substantial development in 3D mapping technology. Meanwhile, Apple's Lidar is still a new sensor. Therefore, this article reviews the potential uses of the Apple Lidar sensor in various fields, including engineering and construction, focusing on indoor and outdoor as-built 3D mapping and cultural heritage conservation. The affordable cost and shorter observation times compared to traditional surveying and other remote sensing techniques make the Apple Lidar an attractive choice among scholars and professionals. This article highlights the need for continued research on the Apple LiDAR sensor technology while discussing its specifications and limitations. A
... Show MoreProduction sites suffer from idle in marketing of their products because of the lack in the efficient systems that analyze and track the evaluation of customers to products; therefore some products remain untargeted despite their good quality. This research aims to build a modest model intended to take two aspects into considerations. The first aspect is diagnosing dependable users on the site depending on the number of products evaluated and the user's positive impact on rating. The second aspect is diagnosing products with low weights (unknown) to be generated and recommended to users depending on logarithm equation and the number of co-rated users. Collaborative filtering is one of the most knowledge discovery techniques used positive
... Show MoreSequence covering array (SCA) generation is an active research area in recent years. Unlike the sequence-less covering arrays (CA), the order of sequence varies in the test case generation process. This paper reviews the state-of-the-art of the SCA strategies, earlier works reported that finding a minimal size of a test suite is considered as an NP-Hard problem. In addition, most of the existing strategies for SCA generation have a high order of complexity due to the generation of all combinatorial interactions by adopting one-test-at-a-time fashion. Reducing the complexity by adopting one-parameter- at-a-time for SCA generation is a challenging process. In addition, this reduction facilitates the supporting for a higher strength of cove
... Show MoreIn this paper, chip and powder copper are used as reinforcing phase in polyester matrix to form composites. Mechanical properties such as flexural strength and impact test of polymer reinforcement copper (powder and chip) were done, the maximum flexural strength for the polymer reinforcement with copper (powder and chip) are (85.13 Mpa) and (50.08 Mpa) respectively was obtained, while the maximum observation energy of the impact test for the polymer reinforcement with copper (powder and chip) are (0.85 J) and (0.4 J) respectively
This paper is employed to discuss the effects of the magnetic field and heat transfer on the peristaltic flow of Rabinowitsch fluid through a porous medium in the cilia channel. The governing equations (mass, motion, and energy) are formulated and then the assumptions of long wavelength and low Reynold number are used for simplification. The velocity field, pressure gradient, temperature, and streamlines are obtained when the perturbation technique is applied to solve the nonlinear partial differential equations. The study shows that the velocity is decreased with increasing Hartmann number while it is decreased with increasing the porosity.
A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreA novel technique Sumudu transform Adomian decomposition method (STADM), is employed to handle some kinds of nonlinear time-fractional equations. We demonstrate that this method finds the solution without discretization or restrictive assumptions. This method is efficient, simple to implement, and produces good results. The fractional derivative is described in the Caputo sense. The solutions are obtained using STADM, and the results show that the suggested technique is valid and applicable and provides a more refined convergent series solution. The MATLAB software carried out all the computations and graphics. Moreover, a graphical representation was made for the solution of some examples. For integer and fractional order problems, solutio
... Show MoreTrickle irrigation is a system for supplying filtered water and fertilizer directly into the soil and water and it is allowed to dissipate under low pressure in an exact predetermined pattern. An equation to estimate the wetted area of unsaturated soil with water uptake by roots is simulated numerically using the HYDRUS-2D/3D software. In this paper, two soil types, which were different in saturated hydraulic conductivity were used with two types of crops tomato and corn, different values of emitter discharge and initial volumetric soil moisture content were assumed. It was assumed that the water uptake by roots was presented as a continuous sink function and it was introduced into Richard's equation in the unsaturated z
... Show More